114 research outputs found

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    Securing Cognitive Radio Networks using blockchains

    Get PDF
    Due to the increase in industrial applications of Internet of Things (IoT), number of internet connected devices have been increased accordingly. This has resulted in big challenges in terms of accessibility, scalability, connectivity and adaptability. IoT is capable of creating connections between devices on wireless medium but the utilization of scarce spectrum in efficient manner for the establishment of these connections is the biggest concern. To accommodate spectrum allocation problem different radio technologies are being utilized. One of the most efficient technique being used is cognitive radio, which dynamically allocate the unlicensed spectrum for IoT applications. Spectrum sensing being the fundamental component of Cognitive Radio Network (CRN) is threatened by security attacks. Process of spectrum sensing is disturbed by the malicious user (MU) which attacks the primary signal detection and affects the accuracy of sensing outcome. The presence of such MU in system, sending false sensing data can degrade the performance of cognitive radios. Therefore, in this article a blockchain based method is proposed for the MU detection in network. By using this method an MU can easily be discriminated from a reliable user through cryptographic keys. The efficiency of the proposed mechanism is analyzed through proper simulations using MATLAB. Consequently, this mechanism can be deployed for the validation of participating users in the process of spectrum sensing in CRN for IoTs.publishe

    Cognitive radio network in vehicular ad hoc network (VANET): a survey

    Get PDF
    Cognitive radio network and vehicular ad hoc network (VANET) are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling, and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges, and performance metrics for different cognitive radio VANET applications

    Cognitive radio network in vehicular ad hoc network (VANET): a survey

    Get PDF
    Cognitive radio network and vehicular ad hoc network (VANET) are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling, and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges, and performance metrics for different cognitive radio VANET applications

    Wideband cyclostationary spectrum sensing and characterization for cognitive radios

    Get PDF
    Motivated by the spectrum scarcity problem, Cognitive Radios (CRs) have been proposed as a solution to opportunistically communicate over unused spectrum licensed to Primary users (PUs). In this context, the unlicensed Secondary users (SUs) sense the spectrum to detect the presence or absence of PUs, and use the unoccupied bands without causing interference to PUs. CRs are equipped with capabilities such as, learning, adaptability, and recongurability, and are spectrum aware. Spectrum awareness comes from spectrum sensing, and it can be performed using different techniques

    Cognitive radio network in vehicular ad hoc network (VANET): a survey

    Get PDF
    Cognitive radio network and vehicular ad hoc network (VANET) are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling, and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges, and performance metrics for different cognitive radio VANET applications

    Synoptic analysis techniques for intrusion detection in wireless networks

    Get PDF
    Current system administrators are missing intrusion alerts hidden by large numbers of false positives. Rather than accumulation more data to identify true alerts, we propose an intrusion detection tool that e?ectively uses select data to provide a picture of ?network health?. Our hypothesis is that by utilizing the data available at both the node and cooperative network levels we can create a synoptic picture of the network providing indications of many intrusions or other network issues. Our major contribution is to provide a revolutionary way to analyze node and network data for patterns, dependence, and e?ects that indicate network issues. We collect node and network data, combine and manipulate it, and tease out information about the state of the network. We present a method based on utilizing the number of packets sent, number of packets received, node reliability, route reliability, and entropy to develop a synoptic picture of the network health in the presence of a sinkhole and a HELLO Flood attacker. This method conserves network throughput and node energy by requiring no additional control messages to be sent between the nodes unless an attacker is suspected. We intend to show that, although the concept of an intrusion detection system is not revolutionary, the method in which we analyze the data for clues about network intrusion and performance is highly innovative

    Cyclostationary Algorithm for Signal Analysis in Cognitive 4G Networks with Spectral Sensing and Resource Allocation

    Get PDF
    Cognitive Radio (CR) effectively involved in the management of spectrum to perform improved data transmission. CR system actively engaged in the data sensing, learning and dynamic adjustment of radio spectrum parameters with management of unused spectrum in the signal. The spectrum sensing is indispensable in the CR for the management of Primary Users (PUs) and Secondary users (SUs) without any interference. Spectrum sensing is considered as the effective adaptive signal processing model to evaluate the computational complexity model for the signal transmission through Matched filtering, Waveform and Cyclostationary based Energy sensing model. Cyclostationary based model is effective for the energy based sensing model based on unique characteristics with estimation of available channel in the spectrum to extract the received signal in the PU signal. Cyclostationary based model uses the spectrum availability without any periodic property to extract the noise features. This paper developed a Adaptive Cross Score Cyclostationary (ACSCS) to evaluate the spectrum sensing in the CR network. The developed ACSCS model uses the computational complexity with estimation of Signal-to-Interference-and-Noise Ratio (SINR) elimination of cost function. ACSCS model uses the Adaptive Least square Spectral Self-Coherence Restoral (SCORE) with the Adaptive Cross Score (ACS) to overcome the issues in CR. With the derived ACSCS algorithm minimizes the computational complexity based on cost function compared with the ACS algorithm. To minimize the computational complexity pipeline triangular array based Gram-Schmidt Orthogonalization (GSO) structure for the optimization of network. The simulation performance analysis with the ACSCS scheme uses the Rician Multipath Fading channel to estimate detection probability to sense the Receiver Operating Characteristics, detection probability and probability of false alarm using Maximum Likelihood (ML) detector. The ACSC model uses the Square-law combining (SLC) with the moment generation function in the multipath fading channel for the channel sensing with reduced computational complexity. The simulation analysis expressed that ACSC scheme achieves the maximal detection probability value of 1. The analysis expressed that proposed ACSC scheme achieves the improved channel estimation in the 4G communication environment
    • …
    corecore